• 제목/요약/키워드: privacy by design

검색결과 267건 처리시간 0.023초

Design and Implementation of Context-aware Application on Smartphone Using Speech Recognizer

  • Kim, Kyuseok
    • 한국정보기술학회 영문논문지
    • /
    • 제10권2호
    • /
    • pp.49-59
    • /
    • 2020
  • As technologies have been developing, our lives are getting easier. Today we are surrounded by the new technologies such as AI and IoT. Moreover, the word, "smart" is a very broad one because we are trying to change our daily environment into smart one by using those technologies. For example, the traditional workplaces have changed into smart offices. Since the 3rd industrial revolution, we have used the touch interface to operate the machines. In the 4th industrial revolution, however, we are trying adding the speech recognition module to the machines to operate them by giving voice commands. Today many of the things are communicated with human by voice commands. Many of them are called AI things and they do tasks which users request and do tasks more than what users request. In the 4th industrial revolution, we use smartphones all the time every day from the morning to the night. For this reason, the privacy using phone is not guaranteed sometimes. For example, the caller's voice can be heard through the phone speaker when accepting a call. So, it is needed to protect privacy on smartphone and it should work automatically according to the user context. In this aspect, this paper proposes a method to adjust the voice volume for call to protect privacy on smartphone according to the user context.

거주지원 노인 주거의 공간구성과 실내디자인에 관한 연구 (A Study on Interior Design of Living Unit Space in Assisted Living Facilities)

  • 김화경;김형우
    • 한국실내디자인학회:학술대회논문집
    • /
    • 한국실내디자인학회 1999년도 춘계학술발표대회 논문집
    • /
    • pp.16-22
    • /
    • 1999
  • The present asylums are reported to be hurting the privacy and self-reliance of the individuals by the uniformed manugerial regulations and fragmentary service. Due to the poor linkage of service and uneven quality between facilities, when a person falls into a serious disease he should bear the inconvenience of moving to other facility for the treatment. This study is to investigate the types and pater of welfare facilities for the aged where they can be provided with flexible service in the continuous living environments and to suggest the ideal environments for them to stand on their own feet by assisting properly both in physically and mentally keeping their privacy and sociality.

  • PDF

지능형 해상교통정보 연계시스템에서의 개인정보 보안에 관한 연구 (A Study on Privacy Security in Maritime Information Gateway System)

  • 송용학;김현;조득재;백종화;김도연
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2023년도 춘계학술대회
    • /
    • pp.202-203
    • /
    • 2023
  • 해양수산부는 지능형 해상교통정보 체계 운영을 통해 해사안전 서비스를 제공 중이며, 제공 중인 서비스의 경쟁력 확보를 위한 신뢰성 및 품질 향상 연구가 지속적으로 필요한 상황이다. 이러한 경쟁력 확보를 위해, 지능형 해상교통정보 체계의 실시간 운영 영향을 최소화하는 대용량 해양정보 연계 시스템에 대한 기본설계를 수행하고, 개인정보 보안 문제와 전체적인 시스템 실현을 위해 가명화/암호화 절차가 적용된 이론적 하드웨어 구조도를 제시한 바 있다. 하지만 제시한 구성도 및 설계는 전체적인 개념만을 포함하며, 실제 사용되고 있는 실시간 해양정보 연계를 위해서는 대한민국의 개인정보 보호법을 만족할 수 있는 상세한 개인정보 보안 방안이 요구된다. 이 연구는 이러한 문제의 해결을 위해 지능형 해상교통정보 연계 시스템에서 연계하는 실시간 해양정보 내에서 개인정보 보호법을 침해할 수 있는 요소(선주, 선사, 선장, 항해사, 어민 등의 개인정보)를 식별하고, 식별한 개인정보를 가명화/암호화하여 타 기관으로 연계할 수 있는 방법을 연구한다.

  • PDF

소외계층의 주거환경개선을 위한 소규모 주택 리모델링에 관한 평가연구 - TV 방송 무료주택 리모델링 프로그램 '러브하우스' 사례조사를 중심으로- (Estimation of remodeling of small-scale houses to improve the residential environment for the underprivileged - case study on the TV program 'Love House' for free residential remodeling -)

  • 양세은
    • 한국실내디자인학회논문집
    • /
    • 제17권3호
    • /
    • pp.34-42
    • /
    • 2008
  • The objective of this research is not only making the planning guides regarding a small-scale residential remodeling but also examining closely the social roles of the interior design for the poor and the underprivileged class by analyzing the residential remodeling cases. The scope of research includes 40 remodeling houses free of charge which are broadcasted in the TV program 'Love House'. Taking in consideration the characteristics of users like parentless or single-parent families and families with disabled persons, this study uses the spatial approach, user's convenience approach and psychological problem solving approach, in terms of the methodology. In result of the analysis of their interior design, first of all, it is essential solving the problem of limited house space by comparison with the family number. Second, the universal design concept for the family with disabled persons(72.5%), old persons or children is strengthened guaranteeing privacy in small and old interior space. Third, the interior design is focused in increasing communication among family members, because mental and physical obstacle would obstruct accessibility among them. This research shows the importance of the interior design which makes wide social roles contributing to create "welfare society".

센서 네트워크에서 위치 기밀 수준에 따른 더미 메시지 생성 (Generation of Dummy Messages Depending Upon the Location Privacy Level in Sensor Networks)

  • 차영환
    • 한국전자통신학회논문지
    • /
    • 제11권9호
    • /
    • pp.861-868
    • /
    • 2016
  • 센서 네트워크에서 광역 도청에 대응하여 기지국이나 근원지들의 위치 기밀을 유지하기 위해서는 일반적으로 더미 메시지들을 발행해야한다. 이 논문에서는 기지국과 근원지들 간에 통신 경로를 확보하는 한편, 요구되는 기밀 수준을 고려하여 일정 수의 노드들을 아무런 활동도 하지 않는 휴면 상태로 전환하도록 하여 전체 더미 메시지들의 발생을 줄이는 방법을 제안한다. 시뮬레이션을 통해 기지국과 근원지들 간의 경로 설정 성공률과 그들의 위치 기밀 수준을 검증한다.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

개인정보보호를 위한 개인정보 유출 모니터링 시스템의 설계 (Privacy Leakage Monitoring System Design for Privacy Protection)

  • 조성규;전문석
    • 정보보호학회논문지
    • /
    • 제22권1호
    • /
    • pp.99-106
    • /
    • 2012
  • 다수의 민간기업체 및 공공기관들은 영업, 홍보, 민원처리 등의 업무를 위하여 다양한 방법을 통해 개인정보를 수집하고, 조직의 이익 및 업무처리를 위해 개인정보를 활용하고 있다. 하지만 이렇게 수집된 개인정보에 대한 기술적, 관리적 조치 및 내부통제의 미숙으로 인해 개인정보의 오남용 및 유출이 사회적 문제로 크게 대두되고 있으며, 정부에서도 개인정보보호에 대한 중요성을 인식해 개인정보보호법의 시행을 추진하고 있는 실정이다. 본 연구에서는 조직에서 관리하고 있는 개인정보의 취급 패턴을 분석하여 이상징후를 탐지하고, 사전에 개인정보 유출 및 오남용에 대한 대처가 가능한 방안에 대해 기술하고 있다. 특히 개인정보 유출과 관련된 요소들을 객관적으로 측정이 가능한 핵심위험지표들로 수치화하여 관리할 수 있는 개인정보 유출 모니터링 시스템의 설계 방안에 대해 제시하고자 한다.

오피스의 개인 및 공동 업무환경 평가연구-서울시 오피스 사용자를 대상으로- (A Study on the Evaluation of Personal and Common Work Environment of Offices -Based on Survey of Office Workers in Seoul)

  • 제해성;하미경
    • 한국실내디자인학회논문집
    • /
    • 제7호
    • /
    • pp.3-11
    • /
    • 1996
  • This study intents to provide useful information of effective office works by evaluating existing office work environment. It focuses on evaluating the quality of personal and common work spaces, comparing responses for user groups to their work environment, and identifying factors which affect the satisfaction of work environment . The study is based on the survey which has been answered by 193 respondents from 24 companies (mainly from large corporate companies) in Seoul. This study finds out that noise is the most serious problem in common work space and that environmental comfort and the size of common space are not satisfactory in their effective work. It identifies that open space work environment, which has been expansively provided for a long time, causes noise problem and deprives office workers of privacy and personalization opportunities. The respondents reply that meeting spaces are not enough in number and size and lack of privacy and its adequate quality . They respond that privacy , chair comfortness and storage spaces are important factors for personal work spaces. In order to improve the quality and efficiency of work, this study proposes that companies should provide convenient office facilities which considering human ergonomic and should educate professional facility managers.

  • PDF

RFID 프라이버시를 위한 ECC기반의 익명인증기법 (A Anonymous Authorization Scheme Based on ECC for RFID Privacy)

  • 김석매;이영진;이상호;이충세
    • 한국통신학회논문지
    • /
    • 제33권3C호
    • /
    • pp.293-298
    • /
    • 2008
  • 최근 이동통신기술의 발달과 사용편리성을 위한 최근에 모바일 RFID리더기애 대한 연구 개발도 활발하게 진행되고 있다. 특히 현재 RFID 시스템에서는 리더와 백-엔드 DB 구간은 유선구간으로 간주하여 안전한 채널로 가정하고 있다. 그러나 모바일 RFID 리더기 사용으로 시스템에는 무선 환경의 보안 취약성과 프라이버시 침해 등 문제점이 발생하고 있다. 이 논문에서는 초특이 타원 곡선 Weil-pairing 유한군을 적용한 타원 곡선 암호 알고리즘을 사용하여 은닉서명을 설계하고 그 은닉서명을 기반으로 사용자 익명성이 보장되는 모바일 RFID리더 인증 기법을 제안한다.